What type of malicious activity involves carefully constructing a series of actions to interfere with the way memory is allocated in a system?

a. SYN flood
b. Session hijacking
c. Buffer overflow
d. Spoofing


Answer: c. Buffer overflow

Computer Science & Information Technology

You might also like to view...

What is a cache relative to a computer?

What will be an ideal response?

Computer Science & Information Technology

Describe three methods used by HTTP/2 intended to decrease latency and provide for quicker loading of web pages in browsers.

1. Single Constant Connection. 2. Multiplexing. 3. Prioritization. 4. Compression. 5. Server Push. 6. Binary.

Computer Science & Information Technology

The Scenario Manager has the ability to add, edit, and ________ scenarios

Fill in the blank(s) with correct word

Computer Science & Information Technology

COGNITIVE ASSESSMENT What are the four steps in the machine cycle?

A. arithmetic calculations, comparison, storing, pipelining B. decoding, fetching, executing, controlling C. storing, executing, registering, cycling D. executing, fetching, storing, decoding

Computer Science & Information Technology